- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Good Day,
I am struggling with an IPsec Tunnel between a CP device and a Fortinet device, Using AES-256, SHA256 and Group19 for both Phase 1 and Phase 2 encryption yet get the above error. First time I am doing an IPsec tunnel between the two devices would anyone be able to advise me as to what the problems could be
This usually points to a mismatch in configuration.
Refer to #11 here: https://support.checkpoint.com/results/sk/sk181787
Do you even see phase 1 completing? You can check that via vpn tu on CP and from gui on Fortigate. Debugs you can do. I would still double check to make sure all settings do match, but debug would 100% confirm that. If it fails phase 1, depending where, it could be PSK issue or basic settings are mismatched. If phase 2, than most likely vpn domains.
CP:
vpn debug trunc
vpn debug ikeon
-generate traffic
vpn debug ikeoff
get iked and vpnd files from $FWDIR/log dir
Fortigate:
di de di
di de application ike -1
di de en
Hope that helps.
Andy
Encryption groups are configured the same but get the below
457126603; 9Jul2025 10:45:01.279891;[kern];[tid_1];[SIM-241580892];sim (vpn_encrypt): drop due vpn_ipsec_encrypt returns PKT_DROP(3);
457126603; 9Jul2025 10:45:01.279897;[kern];[tid_1];[SIM-241580892];handle_vpn_encryption: ipsec_encrypt failed: failed to find SA. Dropping packet;
457126605; 9Jul2025 10:45:01.279902;[kern];[tid_1];[SIM-241580892];sim_pkt_send_drop_notification: (0,1) received drop, reason: Encryption Failed, conn;
457126605; 9Jul2025 10:45:01.279907;[kern];[tid_1];[SIM-241580892];sim_pkt_send_drop_notification: sending packet dropped notification drop mode: 0 debug mode: 1 send as is: 0 track_lvl: -1, conn;
457126605; 9Jul2025 10:45:01.279911;[kern];[tid_1];[SIM-241580892];sim_pkt_send_drop_notification: sending single drop notification, conn;
457126606; 9Jul2025 10:45:01.279917;[kern];[tid_1];[SIM-241580892];do_packet_finish: SIMPKT_IN_DROP vsid=0, conn:
What do you see on Fortigate side?
Andy
The traffic is coming through on their side so they can see the ping request coming through and no errors show up
The Check Point "traffic selectors unacceptable" message should include the networks it is sending to the Fortinet, see the highlighted section below. Do the networks in that message match on the Fortinet side? If not, that is the problem.
How do you have the addresses setup on the Fortinet side for Phase 2 selectors? Do you have it configured as "IP Address" or "Subnet"? You have to have the tunnel sharing mode setup on the Check Point side to match. Ideally you should be defining a subnet for the Fortinet Phase 2 selector and using the Check Point "One VPN tunnel per subnet pair" option for tunnel sharing.
Have it configured as IP's on the Fortigates side, One VPN tunnel per subnet pair. No Message comes up on the Fortigate side with Traffic selectors being a problem only on Checkpont side
I get a lot on MyTSi and some on Peer TSr, we did try and configure the ones missing on the Fortinet side but just added more on their side after doing so
Setting them as IP addresses on the Fortigate side means you need to use the Check Point VPN tunnel sharing mode as "One VPN tunnel per each pair of hosts". You will also need to make sure that those IP addresses are defined as hosts within your Check Point VPN domain.
I have changed it to One VPN tunnel per each pair of hosts, but also see that there was no VPN domain setup, I took over from the last guy and he wasn't motivated to continue with it so it wasn't completed when he left so now left with trying to get this working
Is it combo of hosts/subnets? If so, then choose per gateway.
Andy
I know the Fortigate side has /32s and CP side has /24
Just want to confirm that they need to config the MyTSi from CP side onto the fortigate side is that correct?
They do, yes. It has to match 100%, otherwise, it wont work.
How is tunnel managament currently configured on CP side?
Andy
If its universal tunnel, that looks right. Can you send the same for Fortigate side? We need to make sure it matches.
Andy
I have asked the Fortinet side to send, I don't have access there myself
Though also checking these out from one of the older posts you helped with making sure they are on false
ike_enable_supernet
ike_p2_enable_supernet_from_R80.20
ike_use_largest_possible_subnets
Please ask them for what I attached, that what we need. Its from my lab, I had Fortisase tunnel, but since Fortinet does not allow it to be in sslvpn mode any more (they even force people to sign an agreement stating they are okay with it, due to security reasons), but they had to wipe my lab to convert it to ipsec mode, so thats why tunnel is down, but you get an idea.
Andy
Hi Andy,
Please see the Phase 2 selectors from Fortinets side
Something does not make sense here, at least to me. So if its universal tunnel, why even bother using 192.168.x.x and 10.11.x.x subnets? Just have them leave 0.0.0.0 and you can use empty group as enc domain on CP side. Thats how I set many tunnels in the lab and never had an issue.
Andy
You and me both, I've been trying to figure this out as to why it hasn't been working, but will speak to them about just using 0.0.0.0 as that might fix it
The below is the only part that I am struggling with fixing
Child SA exchange: Sending notification to peer: Traffic selectors unacceptable MyTSi: MyTSr: <41.0.234.241> <41.21.161.201> <41.21.231.202 - 41.21.231.203> <192.168.68.0 - 192.168.68.255> <224.0.0.0> <224.0.0.0 - 224.0.0.255> Peer TSi: Peer TSr: <192.168.200.0 - 192.168.200.15>
I have done the CP changes and have asked the fortigate side to leave 0.0.0.0 only and will see tomorrow and give feedback
Let us know. Happy to do remote if available, just need to be outside EST business hours.
Andy
Hi, the tunnel is now authenticated from the changes you suggested on both CP and Fortigates side, now Fortigate just needs to allow the traffic through the firewall haha
There you go...I had done this probably, um, I dont know, 100+ times, so its all in my head, somehow lol
Glad we can help. let us know once it works fully.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
5 | |
5 | |
4 | |
4 | |
3 | |
3 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY